your career. General Role Description The Cyber Security Analyst is responsible for monitoring, detecting Responsibilities: Monitor and analyze security alerts from various security tools and information sources to incidents. Investigate suspicious activities, security breaches, and cyber attacks to determine their to identify security gaps and propose remediation strategies. Develop and implement security standards countermeasures to mitigate risks and enhance the overall security posture. Collaborate with cross-functional teams
the GROUP enterprise UEM, Endpoint Protection, security platform components and tools. (e.g. EDR Production for the verification, planning and actioning of security topics together with other IT teams. Continuously work on improving the operational stability and security. Work on operations, troubleshooting and maintenance improve the security posture of our platforms Test and integrate new features Take care that security related coordination to reach the KPIs and SLAs in the security reporting. QUALIFICATIONS/EXPERIENCE Min. 5-7
to all institutes. Ensure that all systems are secured and protected to all threats i.e. effective deployment monitoring of Antivirus in the ICT environment. Review security and backup procedures and processes for improvement endpoint security, management i.e. AV and patch deployment. Ensure diagnosis and resolution of security incidents and functionality. Operational Write reports on security incidents. Participate in change control implementation qualification in an IT field. Formal Microsoft Security Certifications; MCSE. Min 5 years Systems Engineering
supplies very sophisticated and reliable Perimeter Security Sensor and Surveillance Systems. We are currently companies allowed to supply the IMPI Perimeter Security Intrusion Detection / Monitoring System, which integrator of locally available high end Electronic Security Solutions and had very good results for a small company, but on seeing a niche market for higher end security systems we changed strategy and started importing only, with the intention of empowering smaller security companies to become independent commercially viable
Join the Securities and Financial Markets Law Research Niche under the Mentorship/Supervision of Prof University, South Africa. Securities & Financial Markets Law (Securities Regulation, Financial Inclusion Measures to Curb Financial Crime, Fintech and Securities Law, Fintech and Financial Markets Law. Submit
Join the Securities and Financial Markets Law Research Niche under the Mentorship/Supervision of Prof University, South Africa. Securities & Financial Markets Law (Securities Regulation, Financial Inclusion Measures to Curb Financial Crime, Fintech and Securities Law, Fintech and Financial Markets Law. Submit
Knowledge /Qualifications High knowledge in AWS – security groups, permissions, VPC, roles, services. Experience understanding of best practices regarding system security measures Advanced education and application of sound security and governance. Coordinate with the cloud COE team for any AWS account level security and Resolve any security findings on your responsible AWS accounts given by group security. Manage the CI/CD
ensuring system scalability, interoperability, and security. The IT Architect provides strategic direction hardware, software, networks, data management, and security components. Evaluate and recommend emerging technologies with security teams to ensure that architectural designs and implementations adhere to security best
supplies very sophisticated and reliable Perimeter Security Sensor and Surveillance Systems. We are currently companies allowed to supply the IMPI Perimeter Security Intrusion Detection / Monitoring System, which integrator of locally available high end Electronic Security Solutions and had very good results for a small company, but on seeing a niche market for higher end security systems we changed strategy and started importing only, with the intention of empowering smaller security companies to become independent commercially viable
of cloud security principles and best practices, with a track record of implementing security measures Automation Cloud Infrastructure Dev Ops Quality and Security Collaboration Stakeholder Engagement Leadership